CFP last date
16 December 2024
Call for Paper
January Edition
IJAIS solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 16 December 2024

Submit your paper
Know more
Reseach Article

A Study on Security and Privacy Issues of Cloud Eco-System

by Manu A. R, V. K Agrawal, K N Bala Subramanya Murthy
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 5 - Number 5
Year of Publication: 2013
Authors: Manu A. R, V. K Agrawal, K N Bala Subramanya Murthy
10.5120/ijais13-450931

Manu A. R, V. K Agrawal, K N Bala Subramanya Murthy . A Study on Security and Privacy Issues of Cloud Eco-System. International Journal of Applied Information Systems. 5, 5 ( April 2013), 28-37. DOI=10.5120/ijais13-450931

@article{ 10.5120/ijais13-450931,
author = { Manu A. R, V. K Agrawal, K N Bala Subramanya Murthy },
title = { A Study on Security and Privacy Issues of Cloud Eco-System },
journal = { International Journal of Applied Information Systems },
issue_date = { April 2013 },
volume = { 5 },
number = { 5 },
month = { April },
year = { 2013 },
issn = { 2249-0868 },
pages = { 28-37 },
numpages = {9},
url = { https://www.ijais.org/archives/volume5/number5/452-0931/ },
doi = { 10.5120/ijais13-450931 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T17:58:36.557666+05:30
%A Manu A. R
%A V. K Agrawal
%A K N Bala Subramanya Murthy
%T A Study on Security and Privacy Issues of Cloud Eco-System
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 5
%N 5
%P 28-37
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is an Internet-based model for enabling appropriate on - demand network gateway to the pooled setup of computing resources and related infrastructure on sharing basis. Cloud computing offers four broad categories of services namely, IaaS, PaaS, DSaaS and SaaS. In these cloud services, individuals and organizations usually face security, privacy and trust challenges. Most of the R & D centers and researchers across the world are working towards resolving these security issues and achieving the trust among each other. In this paper we present a framework for unified security design which may help to resolve privacy, trust and security challenges that are faced in cloud- based networks. We also expect that this would help us to understand existing security challenges, while trying to achieve common standards for secure cloud services, design secure cloud transmission protocol, and devise an algorithm in this regard.

References
  1. National Institute of Standards & Technology, Definition and standards, on cloud computing.
  2. N. Sarat Chandra Babu, "Cloud Security", CSI. Proceedings of the international conference on advances in cloud computing, ACC-2012, July 26-28.
  3. Security Guidance for Critical Areas of Focus in Cloud Computing - CSA.
  4. Whitehall drives open standards compliance regime
  5. David Bicknell Published 01 November 2012.
  6. "The-Emergence-of-As-A-Service-Offerings-That-Are-Not-Cloud-Services", Business & Technology Sourcing Review - Issue 18, 19 Dec 2012.
  7. White paper "The Seven Standards of Cloud Computing Service Delivery" - Salesforce
  8. Dinesha H A, V. K Agrawal "Framework Design of Secure Cloud Transmission Protocol", IJCSI, Vol. 10, Issue 1, No 1, January 2013
  9. Government of Saskatchewan Reference document – Plan and annual Report, Comprehensive guidelines
  10. CONCURRENT JURISDICTION PLANNING, GUIDELINES,AND APPLICATION - MICHIGAN SUPREME COURT, State Court Administrative Office
  11. N. Sarat Chandra Babu, Cloud Computing Overview National Workshop on Cloud Computing, 21st May 2011 C-DAC, KP, Bengaluru
  12. Slidesharenet "Cloud computing vision and strategy feb -2010, GSA draft.
  13. Scribd- doc-48631944-1-Cloud-Computing.
  14. Principles of practices of information security – Michael E. Whitman, Herbert J. Mattord. Cengage learing, India edition.
  15. "Planning Guide Cloud Security", Seven Steps for Building Security in the Cloud from the Ground Up, Intel
  16. Planning for Security – VTU elearning Dr. Nalini N. Prof. & Head, Dept of CSE,NMIT,Bangalore
  17. HTTP: Communication Technology Proceedings-2003. ICCT 2003. International Conference on Study on conformance testing of hypertext transfer protocol by Xiaoli Yu; Jianping Wu; Xia Yin; Dept. of Computer. Sci. , Tsinghua Univ. , Beijing, China.
  18. Microsoft -licensing-options and enrollments.
  19. Security Challenges with Virtualization – Thesis by Hans Peter Reiser
  20. Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales, Daniele Sgandurra, Diego Zamboni, "Cloud Security Is Not (Just) Virtualization Security", CSE-PSU, IBM T. J. Watson Research
  21. "Security in Inter Cloud",
  22. Wikipedia – "Cloud_computing_security".
  23. Ibm developer works-websphere-techjourna--0904_amrhein.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Challenges Security and Privacy Issues